Time filter

Source Type

Sun Y.F.,Zibo Vocational Institute
Applied Mechanics and Materials | Year: 2013

The paper first described the structure of JBPM workflow management system, and then proposed the structure of equipment management system that is focused on the JBPM workflow engine and based on the Framework of Struts, Spring and Hibernate, finally discussed and introduced the key technology of adding equipment function. © 2013 Trans Tech Publications Ltd, Switzerland.

I have performed quantum chemical calculations for the CF3X (X = Cl, Br){bullet operator}{bullet operator}{bullet operator}Au(n) (n = 2, 3, and 4) complexes at M05-2X/aug-cc-pVDZ(PP) level. Two types of optimized structures were obtained. Type I complexes are stabilized by the coordination force between the negative electrostatic potential of halogen atom and the gold atom, and type II complexes contain halogen bonds formed between the σ-hole of the halogen atoms and the negative electrostatic potential of Aun. Results of the interaction energy indicate that type I complexes are more stable than type II complexes. AIM analysis reveals that type II complexes are a closed shell interaction and there is a partially covalent nature for type I complexes.

Li X.-Y.,Zibo Vocational Institute
Acta Crystallographica Section E: Structure Reports Online | Year: 2011

In the title compound, C 15H 12BrClN 2O 2, the dihedral angle between the two substituted aromatic rings is 77.8 (3)°. The molecule exists in a trans conformation with respect to the methylidene unit. In the crystal structure, inversion dimers linked by pairs of N - H⋯O hydrogen bonds generate R 2 8(8) loops.

Li X.-Y.,Zibo Vocational Institute
Acta Crystallographica Section E: Structure Reports Online | Year: 2011

In the title compound, C 15H 12C l2N 2O 3, the dihedral angle between the two substituted aromatic rings is 5.4 (4)°. Intra-molecular O - H⋯N and N - H⋯O hydrogen bonds affect the planarity of the molcular conformation, with a mean deviation from the plane defined by the non-H atoms of 0.062 (2) Å. The mol-ecule exists in a trans configuration with respect to the methyl-idene unit. In the crystal, mol-ecules are linked by N - H⋯O inter-actions. © Xiao-Yan Li 2011.

Sun S.H.,Zibo Vocational Institute
Advanced Materials Research | Year: 2013

According to the inverse solutions of 3-UPU translational parallel robot mechanisms, in which both the base and the mobile platform are triangle and similar to each other, the accuracy model of parallel robot mechanisms is established by the differentiation of the kinematic. The effects of length error of driving poles, structure size change and posture change on the accuracy of robot are studied by simulations,which provided the foundation for practical error compensating and controlling of the mechanism. © (2013) Trans Tech Publications, Switzerland.

Zhang L.-R.,Zibo Vocational Institute
Applied Mechanics and Materials | Year: 2014

Design and selection of hydraulic support is the core of coal mine fully mechanized mining equipment selection and matching, determine the hydraulic supporting strength Using the numerical simulation method and shallow buried depth of roof structure of theoretical calculation method, determines the necessary technical parameters such as the support frame, the bracket height and the bottom plate pressure According to the coal seam thickness and coal seam structure, which has the instructive meaning in application. Equipment selection and matching of Comprehensive mining coal face is one of the important material base, coal achieve reaches producing direct relationship between the working surface of the smooth realization of the goal, is related to the stability and reliability of fully mechanized equipment. Face "compressors": hydraulic support, coal winning machine and scraper conveyor selection is very important, the design of the hydraulic support selection is the core. © (2014) Trans Tech Publications, Switzerland.

Li X.X.,Zibo Vocational Institute
Applied Mechanics and Materials | Year: 2013

4 groupsconcrete columns specimens which have different eccentricityities were fabricated, The first specimen was just made of reinforced concrete. The second was enlaced with 3 lays carbon fiber reinforced polymer. The third had SFRCs added to it. The last was reinforced with SFRCs and enlaced with carbon fiber reinforced polymer.The results showed that the introduction of fibres as well as wrapping the specimens with FRP improve the strength of concrete,especially its ductility. © (2013) Trans Tech Publications, Switzerland.

Pan X.,Zibo Vocational Institute
Advances in Information Sciences and Service Sciences | Year: 2012

In this paper a SFLA has been developed for optimal placement and size of DER considering loss minimization and voltage profile improvement as objectives. Different sizes of DERs are considered for different cases studied. In all cases the SFLA algorithm shows reliable convergence, exhibits improved voltage profiles, and reduced real and reactive power losses. Further, in comparison with the Particle Swarm Optimization (PSO) the SFLA algorithm suggests better optimal locations of DERs leading to further reduction in losses.

Li G.,Zibo Vocational Institute
Advances in Intelligent and Soft Computing | Year: 2012

The air conditioning system control object multivariable, nonlinear, large time delay, time-varying characteristics of the PI control and fuzzy control combined proposed fuzzy adaptive PI control, and simulation. Simulation results show that this method of control is better than the conventional PI control and fuzzy control to eliminate the shortcomings of steady-state error is greater with short response time, high control precision and good stability. © 2012 Springer-Verlag GmbH.

Dong C.,Zibo Vocational Institute
Signal Processing: Image Communication | Year: 2014

This paper proposes a color image encryption scheme using one-time keys based on coupled chaotic systems. The key stream has both the key sensitivity and the plaintext sensitivity. The Secure Hash Algorithm 3 (SHA-3) is employed to combine with the initial keys to generate the new keys, to make the key stream change in each encryption process. Firstly, the SHA-3 hash value of the plain image is employed to generate six initial values of the chaotic systems. Secondly, combine and permute the six state variables, and randomly select three state variables from them, to encrypt the red, green and blue components, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks, so the scheme is reliable to be applied in image encryption and secure communication. © 2013 Elsevier B.V.

Loading Zibo Vocational Institute collaborators
Loading Zibo Vocational Institute collaborators